Unlock instant, AI-driven research and patent intelligence for your innovation.

Network encryption methods for realizing encryption of local area networks at the bottom layer driver of network cards of embedded devices

a network encryption and local area network technology, applied in the field of network encryption methods, can solve problems such as complicated use environment, and achieve the effect of improving data transmission safety

Active Publication Date: 2021-08-31
XIAMEN YEALINK NETWORK TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This method ensures unified encryption of all data in the local area network, enhancing data transmission security by encrypting data down to the network linking layer, allowing developers to focus on other aspects and providing flexibility in encryption configuration.

Problems solved by technology

However, when connecting slave devices, it needs to supply dedicated power to the slave devices, resulting in complicated use environment.
However, such encryption method merely achieves encryption of data above IP layer.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network encryption methods for realizing encryption of local area networks at the bottom layer driver of network cards of embedded devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016]Several aspects of the disclosure are described below in details by reference to appended drawings and specific embodiments. The skilled in the art should understand that the embodiments are set forth to provide an illustration, rather than limit the scope of the present disclosure. The scope of the present disclosure is limited by the appended claims.

[0017]The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise.

[0018]Provided herein is a network encryption method for realizing encryption of a local area network at the bottom layer driver of a network card of an embedded device, which comprises the following steps:[0019]Step 1. performing an encryption protocol on a network card driver, which is used for performing management of the encryptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed herein is a network encryption method for realizing encryption of a local area network at the bottom layer driver of a network card of an embedded device. By using such method, an encryption protocol is performed on the network card driver, thereby achieving encryption and decryption of all network data in the network card driver within the local area network, and achieving encryption of all data above network linking layer, so as to achieve unified encryption of all data in the local area network, resulting in enhanced safety of transmission of network data. Moreover, since encryption of the network data is performed in the network driver, developers do not need to focus on encryption situation.

Description

RELATED APPLICATIONS[0001]This application claims priority to Chinese Application Number 201910040373.4, filed on Jan. 16, 2019, which is herein incorporated by reference.FIELD OF THE DISCLOSURE[0002]The present disclosure relates to a method for encryption of networks, more particularly, to a network encryption method for realizing encryption of a local area network at the bottom layer driver of a network card of an embedded device.BACKGROUND OF THE DISCLOSURE[0003]With development of various smart devices, they may need to connect various slave devices to achieve perfect function for the devices. However, when connecting slave devices, it needs to supply dedicated power to the slave devices, resulting in complicated use environment. Therefore, most of the master devices connect the slave devices via networks. Connection via networks is not only for supplying power to the slave devices, but also for achieving data communication between the master devices and the slave devices via n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L63/0428H04L9/0819H04L9/3234H04L63/162H04L9/3226H04L63/1491
Inventor ZHANG, HUIRONGWANG, WEITINGJIANG, HUZHONG, JIEXIAN
Owner XIAMEN YEALINK NETWORK TECH